Digital, cloud-centric transformation creates risks the world has never seen—a fluid and dynamic attack surface where adversaries can hide in plain sight. Security professionals need to develop skills to adapt and scale defenses worldwide.
Cyber Threat Workshops are designed for everyone. Why? Because your organization, assets, employees, data, and infrastructure are threatened with cyber-attacks. Security intelligence applies to more than security operations and empowers everyone to uncover threats including nation-states, cybercriminals, ransomware, phishing, hacktivists, and insiders.
|Date||Title and Description|
|January 20||Modernize Security Operations:|
Scale Intelligence with APIs
|February 3||Red Teaming:|
How to identify Attack Surface Risks
|February 17||Threat Hunting:|
How to Find Malware and Phishing Infrastructure
|March 3||Incident Response:|
Extend Detection and Response (XDR Integrations)
|March 17||Global Defense:|
Scale Protection with Security Analytics (SIEM Integration)
|March 31||Adversary Attribution:|
Fingerprint Adversary-Threat Infrastructure (MSTIC + Atlas)
|April 14||Digital Future:|
How We Create a Safer Internet, Together (Preview EASM+TI)
What is Cyber Threat Intelligence?
Actionable attacker insights, relevant to you.
The Information Security Chess Match Infographic
Download the infographic to explore five key elements that all Security Intelligence programs need to have to illuminate the global attack surface.
5 Must-Haves for Security Intelligence White Paper
Learn how deep knowledge of digital relationships can defend the extended digital enterprise.
Join the Community
Team up with thousands of cybersecurity professionals focused on threats to the worldwide attack surface.
Our on-demand workshops give you step-by-step guidance to uncover today's threat landscape.
Interested in attending?